Context-Aware Usage Control for Android, Security and Privacy in Communication Networks, pp.326-343, 2010. ,
DOI : 10.1145/1108906.1108908
Revealing Privacy-Impacting Behavior Patterns of Smartphone Applications (Short Paper) In: MoST 2012 -Proceedings of the Mobile Security Technologies Workshop 2012, 2012. ,
MockDroid, Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, HotMobile '11, 2011. ,
DOI : 10.1145/2184489.2184500
Improving Computer Security Dialogs, Lecture Notes in Computer Science, vol.6949, pp.18-35, 2011. ,
DOI : 10.1007/978-3-642-23768-3_2
A User-Centric Privacy Space Framework Security and Usability -Designing Secure Systems that People Can Use, pp.401-420, 2005. ,
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks, 2011. ,
Is this App Safe ? A Large Scale Study on Application Permissions and Risk Signals, Proceedings of WWW 2012, 2012. ,
Mining large-scale smartphone data for personality studies. Personal and Ubiquitous Computing, 2011. ,
CRePE: Context-Related Policy Enforcement for Android, ISC'10 Proceedings of the 13th international conference on Information security, pp.331-345, 2010. ,
DOI : 10.1007/978-3-642-18178-8_29
Security and Usability -Designing Secure Systems that People Can Use, 2005. ,
Inferring Social Network Structure using Mobile Phone Data, Tech. Rep. usually, vol.1, 2009. ,
PiOS : Detecting Privacy Leaks in iOS Applications, NDSS 2011 Network and Distributed System Security Symposium Proceedings, 2011. ,
Timing is everything?, Proceedings of the 27th international conference on Human factors in computing systems, CHI 09, p.319, 2009. ,
DOI : 10.1145/1518701.1518752
TaintDroid, Proc. of USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2010. ,
DOI : 10.1145/2619091
On lightweight mobile phone application certification, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, p.235, 2009. ,
DOI : 10.1145/1653662.1653691
Android permissions demystified, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, p.627, 2011. ,
DOI : 10.1145/2046707.2046779
SCanDroid: Automated Security Certification of Android Applications, Tech. rep., University of Maryland, 2009. ,
Vision, Proceedings of the second international workshop on Mobile cloud computing and services, MCS '11, 2011. ,
DOI : 10.1145/1999732.1999740
URL : https://hal.archives-ouvertes.fr/halshs-00370184
Understanding individual human mobility patterns, Nature, vol.89, issue.7196, pp.779-82, 2008. ,
DOI : 10.1038/nature06958
An architecture for privacy-sensitive ubiquitous computing, Proceedings of the 2nd international conference on Mobile systems, applications, and services , MobiSYS '04, 2005. ,
DOI : 10.1145/990064.990087
These aren't the droids you're looking for, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, p.639, 2011. ,
DOI : 10.1145/2046707.2046780
A "nutrition label" for privacy, Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS '09, 2009. ,
DOI : 10.1145/1572532.1572538
A Conundrum of Permissions: Installing Applications on an Android Smartphone, Proceedings of USEC 2012, pp.1-12, 2012. ,
DOI : 10.1007/978-3-642-34638-5_6
Cell phone-based biometric identification, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp.1-7, 2010. ,
DOI : 10.1109/BTAS.2010.5634532
Construction and Evaluation of a User Experience Questionnaire, 2008. ,
DOI : 10.1207/s15327906mbr0102_10
A Conceptual Model and a Metaphor of Everyday Privacy in Ubiquitous Computing Environments, Ubiquitous Computing Computer S, 2002. ,
Expectation and purpose, Proceedings of the 2012 ACM Conference on Ubiquitous Computing, UbiComp '12, 2012. ,
DOI : 10.1145/2370216.2370290
Mining smartphone data to classify life-facets of social relationships, Proceedings of the 2013 conference on Computer supported cooperative work, CSCW '13, p.2013, 2013. ,
DOI : 10.1145/2441776.2441810
Apex, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pp.328-332, 2010. ,
DOI : 10.1145/1755688.1755732
Activity-Aware Map: Identifying Human Daily Activity Pattern Using Mobile Phone Data, Human Behavior Understanding, pp.14-25978, 2010. ,
DOI : 10.1126/science.1177170
Path uploads your entire iPhone ad- dress book to its servers path-uploads-your-entire-address-book-to-their-servers When it's better to ask forgiveness than get permission, Proceedings of the Ninth Symposium on Usable Privacy and Security -SOUPS '13, p.1, 2012. ,
Identifying user traits by mining smart phone accelerometer data, Proceedings of the Fifth International Workshop on Knowledge Discovery from Sensor Data, SensorKDD '11, pp.61-69, 2011. ,
DOI : 10.1145/2003653.2003660
Taming Information-Stealing Smartphone Applications (on Android), Proceedings of the 4th international conference on Trust and trustworthy computing (TRUST'11, pp.93-107, 2011. ,
DOI : 10.1007/978-3-642-21599-5_7